St. Rita of Cascia 2023 St. Paul University Philippines
St. Rita of Cascia 2023 St. Paul University Philippines
1. Wireless patient monitoring- Technologies that enable supporting the OS or applications software
remote surveillance of patient vital functions through the programs.
use of internally and externally located patient devices
Categories of Utility Software:
examples are: wirelessly monitored pacemakers an 1. Security Software – protects the computer and its
automatic defibrillator‘s data from attacks that can destroy programs and
2. Mobile system access-Mobile technologies that enable data.
remote or virtual access to current clinical systems such as 2. Disk Management Utilities – designed to help the
electronic health records or EHR and picture archiving and user keep hard disk space clean and efficient.
3. Backup Utilities – serve to help the users back up
communication system or PA CS examples are: websites
their data.
portals and mobile apps 4. Screen Savers – computer programs that either
3. Medical devices blank the monitor screen or fill it with constantly
4. Mobile and or wireless enabled technologies that capture moving images when the user is away from the
and track key care compliance and disease management computer but does not turn it completely off.
data examples are digital glucometers blood pressure 5. Archival Software – compresses information in files
devices and pedometers to be archived, and then stores them in a compressed
form in some long-term storage device.
5. virtual consultation-Remote connectivity and multimedia
6. Programming Environment Support Programs –
solutions that enable virtual care consultation, education used by program developers to support their
and therapy examples are: Tallac consultations, mobile programming work or to run their programs.
video solutions 3. Applications Software
6. Aging in place-Remote technology is that enable clinically - Includes all the various programs people use to do
monitored independent living for aging populations work, process data, play games, communicate with
examples are: personal emergency response systems or others, and watch videos and multimedia programs
on a computer
PERS, video consultations, motion or activity monitoring,
- Application programs are written in a particular
fall detection, aggregation, transport programming language. Then the program is
“compiled/translated” into machine language so the
Computer Software computer can understand the instructions and
tells what to the computer “what to do” execute the program.
Includes all the intangible components that are not considered - By far, the most commonly used set of programs are
hardware the programs in the office package, such as Microsoft
SOFTWARE refers to various types of computer programs Office, ApacheOpen Office, or LibreOffice, or any of
Major areas: the many other office suites.
computer programs
software packages Information Science
programming languages - an interdisciplinary field primarily concerned with the
computer programming analysis, collection, classification, manipulation, storage,
Purposes of Software retrieval, movement, dissemination, and use of
1. Translates instructions created in human language into information.
Machine language
2. Makes the computer an economic tool KEY THEMES IN INFORMATION SCIENCE:
Optimality – refers to achieving an optimum value for
Categories of Software: some desired outcome.
1. System Software - May refer to almost any variable that is measured on
- Helps speed up the computer’s processing, expands a numerical scale, such as cost, time, workload, etc.
the power of the computer by creating cache Performance – typically considered in the context of
memory, reduces the amount of confusion when average performance of the information system over a
multiple programs are running together, “cleans up” series of communication instances.
the hard drive so that the storage is managed Complexity – reality with the enormous masses of data
efficiently, and performs other such system and information generated, collected, stored, and
management tasks. retrieved.
2. Utility Software Structure – developing a system for ordering and
- Include programs designed to keep the computer cataloging the data and information, particularly in a
system operating efficiently – they do this by adding database.
power to the functioning of the system software or
TWO IMPORTANT LATE 3RD GENERATION changing of raw data into information as instructed by
LANGUAGES: computer programs
Visual Programming Languages Data aggregates what we put and then processed to become
- Visual BASIC (Beginners’ All-purpose an information
Symbolic Instruction Code) and Visual C+
We need both hardware and software to make an output • organized collection of related data. Placing notes in folders and
that is useful folders in file cabinets is one example of creating a paper
database; however, you can organize and store data in many
Data processing operations: different formats in a data- base. Healthcare professional may
• input store, inquire, update, retrieve, sort, transform, classify, store patient medical records in either paper or digital format but
compare, compute, summarize, report, output more and more healthcare organizations are converting to digital
Depends on the software we use, certain operations are utilized records. They can use each of these databases to store data and
Data to search for information. The possibility of finding information in
raw facts that represent single pieces of information these databases depends on several factors.
The smallest units for information that can be stored retrieved Types of Data
and or edited There are two primary approaches to classifying data in a
Stored in the computer memory and secondary storage database system. First, they are classified in terms of how the
Data- naming, collecting and organizing users will use these data. This is the conceptual view of the data.
Information- organizing, interpreting Conceptual data classifications may include financial data, patient
Knowledge- interpreting, integrating and understanding data, or human resource data. Second, data are classified by their
Wisdom- understanding, applying integrating service with computerized data type. For example, data can be numbers or
passion letters or a combination of both. The designer uses this
classification to build the physical database within the computer
Common Database Operations system.
1. Data Input Operations. One uses data input operations to enter Conceptual Data. Conceptual data types how users view the
new data, update data in the system, or change data. The source of the data maybe basis of conceptual data
modify data in the DBMS. One usually enters data through a set of types.
screens that the designers have designed for data entry. A well- Computer-Based Data. Alphanumeric data include letters and
designed screen will discourage data entry errors. numbers in any combination; however
2. Data Processing Processes. Data processing process are DBMS- you cannot perform numeric calculations on the numbers in an
directed actions that the computer performs on entered data. The alphanumeric field
purpose is to extract information, discover new meanings, reorder Data base management (DBMS)
data and so forth. It is these processes that one uses to convert • allows input, storage, and access in a database
raw data into meaningful information. Database system design- process of configuring the database
3. Data Output Operation. Include online and written reports. software
Outputs can also include presentation of the processed data in DATA BASE MANAGEMENT SYSTEMS
charts and graphs for easier understanding. The approach to A set of compute programs with a unique-high level
designing these reports will have a major impact on what programming language for manipulating the data in the database
information the reader actually gains from the report. Designed to create, access, manage and monitor a database
Data structure and storage Major command in a DBMS software:
data are organized and stored in logical entities Create, use, append, edit, modify, list, browse, go to, next,
These entities are arranged in a hierarchy consisting of: and delete
bytes/ characters - fields/ data elements Separates “admission”, “account” (related organizations) so
records - files together they create one big information
databases The programmer usually creates that system while nurses assist
Data Warehouse
- is a large collection of data imported from several different
systems into one database. The source of the data includes not
Set of records are compressed into file only internal data from the institution but can also include data
File constitutes databases from different related sources from external sources.
(hospitals, pharmacies, etc.)
Purpose: When users are viewing several different applications
there are several different versions of the truth. These can result
Data base from looking at the database at different times as well as the use of
different definitions. The user can slice and dice the data from - Can be found in SIAS where there are varieties of
different angles and at different levels of detail. information that can be seen such as personal
information, reports, statement of accounts, etc.
Functions:
•Bibliographical retrieval Systems
- must be able to extract data from the various computer systems
- Consists of document information and literature usually
and import those data into the data warehouse.
found in the library
- must function as a database able to store and process the data in
the database. This includes the ability to aggregate the data and EX. CARD CATALOG
process the aggregated data. •Stand-Alone, Dedicated or Turkey Systems
- must be able to deliver the data in the warehouse back to the - Found in ATM
users in the form of information. •Decision Support and Expert Systems
- Applied also in community talks
Computer System •Artificial Intelligence Systems
The use of systems in a computer technology is based on systems • Natural Language Systems -can be found in voice commands
theory
Healthcare professionals use computer systems consisting of HOSPITAL INFORMATION SYSTEM
multiple, interconnected computers that function to facilitate the • AKA Medical Information System (MIS) or Patient Care
work of groups of providers and their support people in a system System (PCS)
called a network • provides support for a wide variety of both administrative
Computer Networks: and clinical functions
Point-to-point, • Purpose: manage information needed to facilitate daily hospital
very small network in which all parts of the system are operations by all healthcare personnel
directly connected via wires or wireless Components:
Local area network (LAN), wide area network(WAN), and electronic medical record for charting patient care,
metropolitan area network (MAN) admission-discharge-transfer (ADT) systems
-it helps with patient tracking
SYSTEMS THEORY medication administration record(MAR) software
defines as several interrelated parts all working together to supplies inventory systems
achieve desired fault laboratory systems
provides the conceptual basis for a computer system, which computerized patient acuity system
consists of computer parts, all of which are working together to -used to help with nurse staff allocation
make the computer run. hospital e-mail system for communication
the basis for the use of computer system Dashboard
Network theory- subset of system theory -an application for nurses’ application that provides a sort of a menu
- Provide the basis for understanding how the power of of
individual computers has been greatly enhanced through the options from which the nurse can choose
process of linking multiple computers into a single system - provide the nurse a quick way to order common output from
and multiple computer systems into networks certain screens
-alerts the nurses that a procedure is to be performed
SYSTEM TYPES Unfortunately, nursing systems are not found but nurses should be
Mechanical knowledgeable of what they do in the health care setting
Organizational
Human
OPEN SOURCE
INFORMATION SYSTEM
•Information processing system/ data processing system Free Software
•Uses a computer software
Freedom to run, copy, distribute, study, change and improve
• (hardware + software) to process data into information
the software.
•KEY PIECES:
Freedom to run the program, for any purpose
-computer hardware
Freedom to study how the program works, and adapt it to your
-computer software
needs
-database
INFORMATION SYSTEM TYPES Freedom to redistribute copies so you can help others
• Management Information Systems (MIS) Freedom to improve the program, and release your
improvements to the public
Access to the source code is needed to realise most of the above.
•Backdoors possible in close source too and more difficult to detect Data set- are record and associated documentation
Data processing -is the changing of raw data into information as
Not User-friendly instructed by computer programs
FUD: UNIX-legacy - CLI, need to remember archaic commands
Fact: Possibly true in the past. In recent times GUI Windowing APPROACHES TO ORGANIZING DATA:
system very much the default interface. •sorting
Fact: User has a choice of using either GUI or CLI to run most of the •classifying
applications where applicable •summarizing
•calculating
Current State
Summary: FOUR FACTORS IN FINDING INFORMATION IN THE DATABASE:
•Deployment mainly on server side especially as Internet servers 1. How the data are named (indexed) and organized
•More and more corporations taking notice of OSS and asking 2. The size and complexity of the database
questions. 3. The type of data within the database
•Some OSS penetration in SMIs 4. The methodology or tools used to research the database
•In academia, usage high in IT, Computer Science and Engineering
Faculties Information
•Government considering OSS deployment in public sector - is a set of data which is processed in a meaningful way
seriously according to the given requirement.
•MOE may push for more OSS penetration in schools - is processed, structured, or presented in a given context to
•Not much development work in local OSS community make it meaningful and usefulInformation systems are used to
•Open source offers a viable alternative to proprietary software process data and produce information
•FUDs about open source unfounded - The systematic approach used to name, organize and store
•Adherence to open standards and open technologies allow users data in a database has a major impact on how easy it is to find
the freedom to choose the appropriate software - open source or information in the database.
proprietary
•Developing countries have numerous benefits if they use open Assessment- is the evaluation nor estimation of the nature, quality
source or ability of someone or something.
•Government and private sectors have prominent roles to play to
encourage open source usage and acceptance Data assessment is the process of evaluation on the completeness
and accuracy of data.
DATA ASSESSMENT •preliminary to analysis proper
•by the tendency of data sets collected at the same time or nearly
the same time to have similar content error. PERSONAL, PROFESSIONAL AND EDUCATIONAL
INFORMATICS
B. Indirect assessment
• consists of assessing the data sets by analyzing the accuracy of Personal Informatics
statistics derived from them. Was coined to refer such tools aimed at helping users collect and
• less expensive reflect in personal information
• give results as good or better than direct assessment. Uses
• The principle means for assessing the accuracy of a statistic is - uses track finances
comparison with other statistics - document visited locations
•it may rely on a general knowledge rather than on specific - out of curiosity
comparison statistics - to receive awards on social networking sites
Ex: sex ratios at birth in national populations tend to be about 105
Most users are interested in capturing and accessing data
male births per 100 female births. Should survey data indicate a
relevant to health, especially in an effort to change behaviour:
much higher value, it might be concluded that the completeness of
- to lose weight
reporting of female births was deficient. Such conclusions must
- quit smoking
always take due account of context, however a sex ratio at birth of
- or improve sleep
130, for example might indicate sex selective abortion rather than
• or as part of self-managing chronic condition
defective data.
is appearing that help people collect and reflect on personal
information
Data Quality Assessment (DQA)
represents as an interesting area of study in human- computer
- is the process of scientificaslly and statistically evaluating data in
interaction
order to determine whether they meet the quality required for
projects or business processes and are of right and quantity to be First, these systems help people better understand their
able to actually support their intended use. behavior. While many technologies inform people about the
-it can be considered a set of guidelines and techniques that are world, personal informatics systems inform people about
used to describe data, given an application context, and to apply themselves.
processes to asses and improve the quality of data. Second, people participate in both the collection of behavioral
•the aim of a data quality assessment is to identify incorrect data, to information as well as the exploration and understanding of the
estimate the impact on the business processes, and to implement information. This poses demands on users that need to be
corrective action. explored
•helps to identify those records that have become inaccurate, the Finally, we do not know all the problems that people may
potential impact that inaccuracy may have caused and the data’s experience with personal informatics systems. We know that
source. through this assessment, it can be recited and other people want to get information about themselves to reflect on,
potential issues identified and that systems that support this activity need to be effective
•use of computers in the execution of data quality analyses enables and simple to use.
us not only to investigate large quantities of data quickly , on the Identifying problems that people experience in collecting and
basis of quality criteria but also to consult other (reliable) sources in making sense of personal information while using such systems is
an automated way, allowing us to determine the quality of our data critical for designing and developing effective personal
elements. informatics.
personal informatics systems as those that help people collect
Why do we need to Assess? personally relevant information for the purpose of self-reflection
•Up-to-date, accurate information of each step of the Nursing and gaining self-knowledge
Process is the Power behind safe, high quality patient-centered There are 2 core aspects to every personal informatics system:
care. collection and reflection
effective personal informatics systems helps users collect the
NATIONAL NURSING DATA STANDARDS (NNDS) necessary personal information for insightful reflection
•The NNDS initiative supports the implementation of the Canadian Personal informatics goes by other names such as “living by
Health Outcmes for Better Information and Care (C-HOBIC) numbers”, “qualifies self”, self-surveillance“, “self-tracking” and
•C-HOBIC is introducing structured, evidenced-based standardized “personal analytics”.
questions for admission and discharge assessments Personal informatics system help people by facilitating collection
•The information that is collected all have a concept definition, a and storage of personal information and by providing a means of
valid and reliable measure and empirical evidence linking them to exploring and reflecting on the information.
nursing inputs or interventions “informatics” is a subject to a range of definitions and usages, and
•This is important to people receiving care within the health-care in its broadest sense may be used simply as a synonym for
system. information technology
Within computer science, it is commonly used to refer the topics examines the issues and problems that arise from their
related to the representation, processing and communication of practice and how these relate to factors such as educational
information with computational systems and professional context, communication and information
The concerns of computer science include non-semantic aspects practices, psychological and cognitive variables and ICT
of information, for example, the material characteristics and design and use
behavior of bit streams Second, it seeks to contribute to the development of practical
Domain specific areas include health informatics, chemo- knowledge that is relevant to diverse forms of ICT-supported
informatics, business informatics and social informatics learning.
this includes knowledge about appropriate pedagogies.
educational informatics research is concerned with the
Medical and Nursing Informatics relationships between people, information, ICTs, learning
is used as an overarching term both to describe any informatics and professional practice at the level of individual and social
efforts related to health care and also to describe a distinct action, and in diverse organizational and institutional
specialty in the discipline of medicine. settings.
Nursing informatics is the specialty that integrates nursing It includes studies that focus on the cognitive and
science, computer science and information science in identifying, psychological aspects of the individual learners’ interactions
collecting, processing and managing data and information to with ICT- based information, as well studies that focus on
support nursing practice, administration, education, research and the impact of ICTs on learning interactions within groups or
expansion of nursing knowledge. communities, including the impact of using computer-
Supports all nursing specialties, in all sites and setting whether at mediated communication (CMC) media
the basic or advanced level.
• Practice includes the development of application tools, processes Additional Notes/Reminders:
and structures that assist nurses with the management of data in
1. PPT notes are in BLACK
taking care of patients or in supporting their practice in nursing.
2. Lecture notes are in RED
3. Information retrieved in books are in BLUE
Professional Informatics
•Kling and Hara note that research in these areas tends to be
defined as the study of the application of ICTs and information
management (IM) techniques to the domain in question, References
although they suggest that definitions of informatics research PPT from Dr. Lorica, Essentials of Nursing Informatics by Virginia
that are solely “application-focused” fail to draw sufficient K. Saba and Kathleen A. McCormick
attention to the need to understand the human consequences of
these applications, and to what constitutes the appropriate
Transers
application of ICTs and IM in specific contexts.
Abad, Bunuan, Cabildo, Cabling, Poquiz
Educational Informatics
educational informatics research is still an emergent domain,
given recent impetus by developments in the use of the Internet
as both an information environment and an environment for
learning.
the domain is defined as: the study of the application of digital
technologies and techniques to the use and communication of
information in learning and education
Main Concerns :
First, research in educational informatics seeks to understand the
effects on people using digital information resources, services,
systems. environments and communications media for learning
and education.